The following pages link to (Q4279661):
Displaying 40 items.
- New criterion for diffusion property and applications to improved GFS and EGFN (Q329176) (← links)
- An improved preimage attack against \texttt{HAVAL-3} (Q477698) (← links)
- MJH: a faster alternative to MDC-2 (Q498970) (← links)
- Optimal collision security in double block length hashing with single length key (Q522211) (← links)
- Generic attacks on the Lai-Massey scheme (Q522214) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Parallel hash function construction based on coupled map lattices (Q718608) (← links)
- Open problems in hash function security (Q887443) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions (Q2107924) (← links)
- Cryptanalysis of MD2 (Q2267363) (← links)
- The security of tandem-DM in the ideal cipher model (Q2397447) (← links)
- On the collision and preimage security of MDC-4 in the ideal cipher model (Q2510658) (← links)
- Provable Chosen-Target-Forced-Midfix Preimage Resistance (Q2889862) (← links)
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles (Q2889880) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 (Q3084241) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- Cryptanalysis of Vortex (Q3637129) (← links)
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More (Q3644195) (← links)
- Cryptanalysis of Tweaked Versions of SMASH and Reparation (Q3644197) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Collisions and Other Non-random Properties for Step-Reduced SHA-256 (Q3644206) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Design and Analysis on a Parallel Chaos-Based Hash Function (Q5138299) (← links)
- Weaknesses in the HAS-V Compression Function (Q5385531) (← links)
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions (Q5458227) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- Faster Multicollisions (Q5504611) (← links)
- Building indifferentiable compression functions from the PGV compression functions (Q5963372) (← links)
- Post-quantum security on the Lai-Massey scheme (Q6109706) (← links)
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions (Q6591967) (← links)
- Automated meet-in-the-middle attack goes to Feistel (Q6595820) (← links)